製品・ソフトウェアに関する情報
EllisLab ExpressionEngine における SQL インジェクションの脆弱性
Title EllisLab ExpressionEngine における SQL インジェクションの脆弱性
Summary

EllisLab ExpressionEngine には、SQL インジェクションの脆弱性が存在します。

Possible impacts リモート認証されたユーザにより、以下のパラメータを介して、任意の SQL コマンドを実行される可能性があります。  (1) system/index.php の column_filter パラメータ (2) system/index.php の category[] パラメータ (3) system/index.php の comment モジュールの tbl_sort[0][] パラメータ
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Oct. 3, 2014, midnight
Registration Date Nov. 6, 2014, 3:49 p.m.
Last Update Nov. 6, 2014, 3:49 p.m.
CVSS2.0 : 警告
Score 6.5
Vector AV:N/AC:L/Au:S/C:P/I:P/A:P
Affected System
EllisLab, Inc.
ExpressionEngine 2.9.1 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2014年11月06日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2014-5387
Summary

Multiple SQL injection vulnerabilities in EllisLab ExpressionEngine before 2.9.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) column_filter or (2) category[] parameter to system/index.php or the (3) tbl_sort[0][] parameter in the comment module to system/index.php.

Publication Date Nov. 5, 2014, 12:55 a.m.
Registration Date Jan. 26, 2021, 3:14 p.m.
Last Update Nov. 21, 2024, 11:11 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:expressionengine:expressionengine:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:ellislab:expressionengine:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:ellislab:expressionengine:2.0.1:public_beta:*:*:*:*:*:*
cpe:2.3:a:ellislab:expressionengine:2.0.2:public_beta:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:ellislab:expressionengine:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:ellislab:expressionengine:2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:ellislab:expressionengine:2.8.1:*:*:*:*:*:*:*
cpe:2.3:a:ellislab:expressionengine:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:ellislab:expressionengine:2.0.0:public_beta:*:*:*:*:*:*
cpe:2.3:a:ellislab:expressionengine:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ellislab:expressionengine:2..5.4:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:*:*:*:*:*:*:*:* 2.9.0
Related information, measures and tools
Common Vulnerabilities List